Assessment Test

  1. Which of the following is not part of the form factor of a server?

    1. Size
    2. Appearance
    3. Dimensions
    4. Security
  2. Which function is made easier when a server has a rail kit?

    1. Installation
    2. Maintenance
    3. Configuration
    4. Accessing
  3. Which of the following is the unit of measurement when discussing rack components?

    1. M
    2. I
    3. U
    4. C
  4. Which of the following is another term for RAID 1?

    1. Duplicating
    2. Doubling
    3. Duplexing
    4. Mirroring
  5. What is the primary function of PXE?

    1. Remote booting
    2. Secure routing
    3. Remote administration
    4. Redundant connections
  6. Shares are used to allocate which of the following to VMs?

    1. ROM
    2. CPU
    3. NVRAM
    4. L2 cache
  7. What is the most common protocol a SAN uses?

    1. IPX
    2. IP
    3. Ethernet
    4. Fibre Channel
  8. Which of the following is true of a NAS?

    1. A NAS has lower latency and higher reliability than a SAN.
    2. A NAS typically supports only RAID 5.
    3. A NAS does not support high throughput.
    4. Implementing a NAS is inexpensive.
  9. To which protocol is the term LUN related?

    1. SCSI
    2. IP
    3. SSL
    4. FDDI
  10. What is the role of a DHCP server in a network?

    1. Issues IP configurations
    2. Translates private to public addresses
    3. Authenticates users
    4. Resolves IP addresses to hostnames
  11. The metric IOPS is used to describe the performance of which resource?

    1. Memory
    2. Disk
    3. CPU
    4. Network
  12. As the number of users assigned to a printer increases, which resource should be increased?

    1. Disk
    2. Metwork
    3. CPU
    4. Memory
  13. What is the function of the command-line utility wevtutil?

    1. Manages log files
    2. Manages network connections
    3. Manages memory issues
    4. Manages CPU affinity
  14. Which of the following is deleted when you execute Disk Cleanup?

    1. Temp files
    2. Memory
    3. Routing tables
    4. Pagefile
  15. Which RAID version requires at least three drives?

    1. RAID 0
    2. RAID 1
    3. RAID 5
    4. RAID 10
  16. Which of the following statements is true with respect to safes?

    1. No safes are fireproof.
    2. Consumer Reports assigns ratings to safes that you can use to assess the suitability of the safe.
    3. Those that are fire resistant will protect a backup tape from being damaged.
    4. When considering a safe, you should focus on two items: the cost and the size.
  17. Which of the following is true of an HIDS?

    1. A high number of false negatives can cause a lax attitude on the part of the security team.
    2. An HIDS cannot address authentication issues.
    3. Encrypted packets can be analyzed.
    4. An HIDS monitors only traffic destined for the machine on which it is installed.
  18. The MBSA vulnerability scanner works on which operating system only?

    1. Linux
    2. Windows
    3. Unix
    4. Mac
  19. Which of the following would Joe use to digitally sign a document so that Sally can verify his signature?

    1. Joe’s private key
    2. Sally’s private key
    3. Joe’s public key
    4. Sally’s public key
  20. Which authentication mechanism is an example of something you are?

    1. Password
    2. Username
    3. Smartcard
    4. Retina scan
  21. What is a common host-based firewall on Linux-based systems?

    1. iptables
    2. nessus
    3. tripwire
    4. scannow
  22. Which of the following can be accomplished using port security?

    1. Set the minimum number of MAC addresses that can be seen on a port
    2. Set the maximum number of IP addresses that can be seen on a port
    3. Define exactly which MAC addresses are not allowed on the port
    4. Set the maximum number of MAC addresses that can be seen on a port
  23. When discussing 802.1x, which of the following roles is played by the user’s computer?

    1. Supplicant
    2. Authenticator
    3. Authentication server
    4. Imperative
  24. Which is the minimum category of cable required for 100 Mbps transmissions?

    1. CAT3
    2. CAT5
    3. CAT5e
    4. CAT6
  25. Which of the following services uses port number 443?

    1. SFTP
    2. NTP
    3. HTTP
    4. HTTPS
  26. What issue does the 802.1ax-2008 standard address?

    1. NIC teaming
    2. Deterministic routing
    3. Secure DNS
    4. MIMO
  27. Which of the following parts of a MAC address is unique for each interface made by a vendor?

    1. UAA
    2. BAA
    3. OUI
    4. EUI-64
  28. How many sets of backup tapes are used in the GFS system?

    1. 2
    2. 3
    3. 4
    4. 5
  29. When creating a backup, what function can be used to verify the integrity of the results?

    1. Checksums
    2. Encryption
    3. Digital signatures
    4. Transaction logs
  30. If you perform a full backup once a week and use a differential backup scheme the rest of the week, how many tapes are required for a restore four days after the Full backup is taken?

    1. 1
    2. 2
    3. 3
    4. 4
  31. Which of the following components is the one you most likely would measure with a multimeter?

    1. NIC
    2. Hard drive
    3. Power supply
    4. CPU
  32. What can be the result of high humidity?

    1. Corrosion
    2. ESD
    3. RFI
    4. EMI
  33. Which of the following is not true about server backplanes?

    1. They can be a single point of failure.
    2. They provide data and control signal connectors for CPU.
    3. Backplane failures are uncommon.
    4. You should implement redundant backplanes.
  34. Which of the following steps in the CompTIA troubleshooting method come first?

    1. Verify full system functionality and, if applicable, implement preventive measures.
    2. Document findings, actions, and outcomes throughout the process.
    3. Identify the problem and determine the scope.
    4. Perform a root cause analysis.
  35. Which command is used on a Windows computer to identify the path taken to a destination network?

    1. traceroute
    2. tracert
    3. ipconfig/trace
    4. trace
  36. On which type of device is port security used?

    1. Hub
    2. Switch
    3. Router
    4. Multiplexer
  37. You receive a destination unreachable message with a source IP address. Where is it coming from?

    1. A remote router
    2. A remote DNS server
    3. A local DNS server
    4. The local router
  38. The sudo fdisk -l command lists the partitions on what type of system?

    1. Windows
    2. Mac
    3. Novell
    4. Linux
  39. In Linux, what is fstab used for?

    1. To mount partitions in boot
    2. To create partitions
    3. To format a partition
    4. To defragment a drive
  40. What component locates the operating system in Linux?

    1. NTLDR
    2. GRUB
    3. Bootmgr
    4. boot.ini
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset